Narrated ‘Ali bin Abi Talib (RA): The Prophet (RA) stood up for a funeral (to show respect) and thereafter he sat down. (Dawud)

Certified Data Centre Risk Professional (CDRP)

4.5/5

This two-day course is designed to introduce attendees to the risk management process. The focus is on data center infrastructure and physical data center facility and equipment. Attendees will learn how to identify and quantify risk in their organization and create a plan to reduce the risk to an acceptable level.

Training Options

Classroom Training

Online Instructor Led

Onsite Training

Overseas Training

Course Information

Introduction to Risk Management

  • Risk management concepts
  • Senior management and risk
  • Enterprise Risk Management (ERM)
  • Benefits of risk management

Data Centre Risk and Impact

  • Risk in facility, power, cooling, fire suppression, infrastructure and IT services
  • Impact of data centre downtime
  • Main causes of downtime
  • Cost factors in downtime

Standards, Guidelines and Methodologies

  • ISO/IEC 27001:2013, ISO/IEC 27005:2011, ISO/IEC 27002:2013
  • NIST SP 800-30
  • ISO/IEC 31000:2009
  • SS507:2008
  • ANSI/TIA-942
  • Other methodologies (CRAMM, EBIOS, OCTAVE, etc.)

Risk Management Definitions

  • Asset
  • Availability/Confidentiality/Integrity
  • Control
  • Information processing facility
  • Information security
  • Policy
  • Risk
  • Risk analysis/Risk assessment/Risk evaluation/
  • Risk treatment
  • Threat/Vulnerability
  • Types of risk

Risk Assessment Software

  • The need for software
  • Automation
  • Considerations

» Show More 👇

Risk Management Process

  • The risk management process
  • Establishing the context
  • Identification
  • Analysis
  • Evaluation
  • Treatment
  • Communication and consultation
  • Monitoring and review

Project Approach

  • Project management principles
  • Project management methods
  • Scope
  • Time
  • Cost
  • Cost estimate methods

Context Establishment

  • General considerations
  • Risk evaluation, impact and acceptance criteria
  • Severity rating of impact
  • Occurrence rating of probability
  • Scope and boundaries
  • Scope constraints
  • Roles & responsibilities
  • Training, awareness and competence

Risk Assessment - Identification

  • The risk assessment process
  • Identification of assets
  • Identification of threats
  • Identification of existing controls
  • Identification of vulnerabilities
  • Identification of consequences
  • Hands-on exercise: Identification of assets, threats, existing controls, vulnerabilities and consequences

Risk Assessment - Analysis and Evaluation

  • Risk estimation
  • Risk estimation methodologies
  • Assessment of consequences
  • Assessment of incident likelihood
  • Level of risk estimation
  • Risk evaluation
  • Hands-on exercise: Assessment of consequences,
  • probability and estimating level of risk

Risk Treatment

  • The risk treatment process steps
  • Risk Treatment Plan (RTP)
  • Risk modification
  • Risk retention
  • Risk avoidance
  • Risk sharing
  • Constraints in risk modification
  • Control categories
  • Control examples
  • Cost-benefit analysis
  • Control implementation
  • Residual risk

Communication

  • Effective communication of risk management activities
  • Benefits and concerns of communication

Risk Monitoring and Review

  • Ongoing monitoring and review
  • Criteria for review

Risk scenarios

  • Risk assessment approach
  • Data centre site selection
  • Data centre facility
  • Cloud computing
  • UPS scenarios
  • Force majeure
  • Organisational shortcomings
  • Human failure
  • Technical failure
  • Deliberate acts

» Show Less 👆

Audience Profile

The primary audience for this course is an IT, Facilities or Data Centre Operations professional working in and around the data centre (representing both end-customers and/or service provider/facilitators) and having responsibility to achieve and improve hi-availability and manageability of the data centre, such as: Data centre managers, Operations / Floor / Facility managers, IT managers, Information security managers, Security professionals, Auditors / Risk Managers / Professionals responsible for IT/corporate governance.

100% Business Fulfilment

Request more Information

    Corporate Training Options

    Online Instructor Led

    Live, Online Training by top Instructors and practitioners across the globe.

    Onsite
    Training

    Conduct training at the work location you desired.

    Classroom Training

    The Venue will be ideally located and easy to access with covid-19 SOP's.

    Overseas Training

    Travel to any desired location for your training.

    What People say?

    Mohammed Aljbreen Operation Specialist, SAMA

    The Clarity of the Content was very good. The explanation of the trainer with in-depth knowledge in a proper flow really impressed me to give 5 star rating.

    Arindam Chakraborty Systems Specialist, King Abdullah University of Sciences & Technology

    The Instructor was really impressive. Clear cut explanation of every topic he covered with real time scenarios.

    Sher Afzal Khan Cloud Engineer, Cloud 9 Networks

    The Trainer and the Course Material, both are good. Good flow of explanation with simple examples. The complete training was focused on current industry challenges.

    Jawed Ahmad Siddiqui Sr. System Administrator, Saudi Ceramics

    The Trainer’s presentation was impressed me to continue the course till end. Never feel bore till the entire sessions. She studied our mindset and follows.

      Not sure,
      which course to choose?

      Our Clients across the Globe!

      Our Corporate Clients